Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers
The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritabl...
What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hack...
Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees...
Bullying and cyberbullying: what it is and how to protect yourself.
News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbully...
What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum
Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology,...
What is SIM Swapping? Here’s how it works.
These days, smartphones are in practically everyone’s pockets. We use them for entertainment, sending messages, storing notes, taking photos, transf...
What are zero-day brokers? Discovering the underground market of security vulnerabilities
Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. Th...
Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis
The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There’s a new inconvenient guest in data centers...
Magnus Carlsen beats ChatGPT at chess without losing a piece!
Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted sc...
Magnus Carlsen beats ChatGPT at chess without losing a piece!
Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted sc...
Putin imposes restrictions on foreign software that has “strangled” Russia
The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (...
How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models
In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in unde...
Sophos fixes vulnerabilities in Intercept X for Windows
Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabiliti...
Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.
Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products t...
OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance
In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that...